ISSC421 W8: Perspective, Resources and the Future | Discussion – Peer Response| Joseph

Description

Howdy Class,

Don't use plagiarized sources. Get Your Custom Assignment on
ISSC421 W8: Perspective, Resources and the Future | Discussion – Peer Response| Joseph
From as Little as $13/Page

With the patterns that we have seen from current events of cyber security risks and attacks, there will assuredly be an increase in risks and attacks from cyber criminals. Technology is increasing everyday and that technology will go to both network security and cyber criminals to use in the endless fight of cat and mouse. Cyber criminals use the same tools that security workers use to help get into networks and break into confidential information on all levels of business and government security.

Currently a major up and coming computer technology is quantum computers. These latest massive thinking and computing computers are expected to send a massive shift in computer ability for both good and bad intentions. Although they were designed with a desire to make simulations and calculations of different experiments be completed faster, they are also used to encrypt and decrypt insane hash functions that no one could possibly break. The concern it brings is the phasing out of all previous encryption hash functions and standardization’s. The weakness of all used encryptions means that any malicious attacker can use this new technology to easily break through all encryptions currently used.

With the use of GRC, IT industries will have a better understanding and approach to initializing and maintaining networks while working in a business setting. Too many business settings are showing that they are not secure enough and are being attacked constantly. This lack of standardization and defense could cost millions for people as major businesses lose the ability to control their networks. Allowing these companies to follow a standard that is known to help improve security and efficiency, then there is a better chance to decrease the successful attacks that are happening to these companies all over the world.

-Joe

References

What is GRC? | IBM. (n.d.). Www.ibm.com. https://www.ibm.com/topics/grc

Plan now for the future of network security. (n.d.). SearchSecurity. https://www.techtarget.com/searchsecurity/opinion/Plan-now-for-the-future-of-network-securityIBM. (2022). What is Quantum Computing? Www.ibm.com; IBM. https://www.ibm.com/topics/quantum-computing